Sciweavers

2663 search results - page 381 / 533
» How to Choose a Timing Model
Sort
View
ECOOPWEXCEPTION
2006
Springer
14 years 1 months ago
Failure Handling in a Network-Transparent Distributed Programming Language
Abstract. This paper shows that asynchronous fault detection is a practical way to reflect partial failure in a network-transparent distributed programming language. In the network...
Raphaël Collet, Peter Van Roy
ASIACRYPT
2001
Springer
14 years 1 months ago
Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices
Abstract. In this paper, we consider the problem of mutually authenticated key exchanges between a low-power client and a powerful server. We show how the Jakobsson-Pointcheval sch...
Duncan S. Wong, Agnes Hui Chan
ACSAC
2000
IEEE
14 years 1 months ago
Dynamic Access Control through Petri Net Workflows
Access control is an important protection mechanism for information systems. An access control matrix grants subjects privileges to objects. Today, access control matrices are sta...
Konstantin Knorr
ESOP
2000
Springer
14 years 1 months ago
A Kleene Analysis of Mobile Ambients
Abstract. We show how a program analysis technique originally developed for C-like pointer structures can be adapted to analyse the hierarchical structure of processes in the ambie...
Flemming Nielson, Hanne Riis Nielson, Shmuel Sagiv
RT
2000
Springer
14 years 1 months ago
Metropolis Light Transport for Participating Media
Abstract. In this paper we show how Metropolis Light Transport can be extended both in the underlying theoretical framework and the algorithmic implementation to incorporate volume...
Mark Pauly, Thomas Kollig, Alexander Keller